Roles
- 1 Overview
- 2 Roles
- 3 Create a New Role
- 4 Resources and Scopes
- 4.1 ADAUDIT
- 4.2 ADCOMPUTERS
- 4.3 ADGPO
- 4.4 ADGROUPS
- 4.5 ADLOGS AND ADMINEVENTS
- 4.6 ADOU
- 4.7 ADROLE AND ADUSERDATA
- 4.8 ADUSERGROUPS AND ADUSERS
- 4.9 AGENT
- 4.10 ALERTUSERSETTINGS AND ALERTS
- 4.11 APPLICATION BASELINE
- 4.12 ASSET AND ASSETBESTPRACTICES
- 4.13 ASSETCREDENTIALS AND ASSETFIREWALLPOLICY
- 4.14 ASSETRUNNINGPROCESS, ASSETSERVICES, AND ASSETSHARES
- 4.15 ASSETSNMPTABLE, ASSETSYSTEMINFO, AND ASSETTIMESTATS
- 4.16 ASSETUSERS AND AUDITLOG
- 4.17 AZUREADCOMPUTERS AND AZUREADERROR
- 4.18 CERTIFICATE AND CERTIFICATECREATE
- 4.19 COMPANY
- 4.20 COMPANYSTATS AND COMPANYSTATSTIMESERIES
- 4.21 COMPLIANCE
- 4.22 COMPLIANCEASSESSMENTS
- 4.23 COMPLIANCECHECKS
- 4.24 CUSTOMGENERATEDREPORTS
- 4.25 CUSTOMPORTSETTINGS
- 4.26 CUSTOMREPORTBUILDER
- 4.27 CYBERLABELLING AND CYBERPATCHING
- 4.28 CYBERUTILS
- 4.29 DIAGNOSTICS AND DISCOVERYSETTINGS
- 4.30 DOMAINCONFIGURATION AND EDR
- 4.31 EVENTS AND EXTENSION
- 4.32 EXTERNALSCAN AND EXTERNALSCAN_ITADMIN
- 4.33 EXTERNALSCANJOB AND EXTERNALSCANJOB_ITADMIN
- 4.34 EXTERNALSCANNSESCRIPTSINFO AND EXTERNALSCANNSESCRIPTSINFO_ITADMIN
- 4.35 EXTERNALSCANOSINFO AND EXTERNALSCANOSINFO_ITADMIN
- 4.36 EXTERNALSCANPORTSINFO, EXTERNALSCANPORTSINFO_ITADMIN AND EXTERNALSCANSETTINGS
- 4.37 EXTERNALSCANSETTINGS_ITADMIN
- 4.38 FSMOROLES AND INSTALLEDPROGRAM
- 4.39 INTEGRATIONRULESSETTINGS
- 4.40 INTEGRATIONS
- 4.41 INTERFACES AND JOBS
- 4.42 KAPICLIENTS
- 4.43 KIDENTITYPROVIDERS
- 4.44 KROLES
- 4.45 KUSERS
- 4.46 LOG4JINFO AND MANAGEAGENTUPDATES
- 4.47 NOTIFICATIONRULES AND NOTIFICATIONTICKETS
- 4.48 PASSWORDPOLICY, PATCHINGSTATUS, AND PATCHSCHEDULER
- 4.49 PDSCANRESULTS, PDSCANSETTINGS
- 4.50 PORTS AND REGISTRYMISCONFIGURATION
- 4.51 REMEDIATION
- 4.52 REMEDIATIONSUPPRESSION
- 4.53 SCHEDULER
- 4.54 SECURESCORE AND SECURITYCOMPLIANCE
- 4.55 SMBSHAREPATHS AND SNMPV2CREDENTIALS
- 4.56 SNMPV3CREDENTIALS
- 4.57 SSLSCANTIMESERIES
- 4.58 STANDARDREPORTS
- 4.59 STORAGE AND TABLESETTINGS
- 4.60 TICKETINGRULESCONFIG
- 4.61 USERPERMISSIONS AND USERSETTINGS
- 4.62 VULNERABILITY AND VULNERABILITYTIMESERIES
- 4.63 WINDOWSUPDATE
Overview
CyberCNS supports Role Based Access Control. Using this feature can create users and restrict those users to specific tasks/companies within CyberCNS.
On the Global View () Navigate to the Roles tab.
CyberCNS has four default roles like Admin, It Admin, No Roles, and Read Only. Apart from these roles, customized roles can be created by the user.
When the Admin chooses to grant the user access to All Companies, the user will be able to access all companies and the Global View.
When the Admin chooses to grant the user access to specific companies, the user will only be able to access those companies and will not have Global View access.
The IT Admin Role user will not be able to create a new company, Edit a company or Delete a company; however, the user will have full Company View and Global View access (Only if the Admin has granted access to all companies).
Agents
Asset
Company
Roles
Admin
By default, the Admin role will have access to all sections and can perform READ, UPDATE, DELETE and CREATE actions.
IT Admin
By default, the IT Admin role will have access to all sections (based on companies allowed) and can perform READ, UPDATE, DELETE and CREATE actions except New Company create or existing company edit/delete actions.
Read Only
By default, the Read Only role will not have access to CREATE, UPDATE & DELETE Companies. The read-only user can view the CyberCNS portal.
No Role
By Default, No Role will have no functionality or role attached to it so only login is created for that user but no information is visible/accessible to the user with this role. Admin will have to grant or change the role to another role based on which user will be able to perform actions.
Create a New Role
In the Roles section, can create a new role and assign tasks that the role is authorized to perform from the Resources and Scopes below.
To add a new role click on +Add as shown below.
Enter a Role Name (eg. Site Administrator) and allow the resources and scopes for the particular role as depicted in the below image.
In the Role section, can add a Role to the users and select the tasks to be performed. So that the users can perform the Resources and Scopes as mentioned below.
All the Resources mentioned below have the options of READ, UPDATE, SAVEDATA, DELETE, CREATE, etc. Can select either of these scopes in particular resources.
Once the Resources and Scopes are selected, click on Save.
Resources and Scopes
ADAUDIT
ADCOMPUTERS
ADGPO
ADGROUPS
ADLOGS AND ADMINEVENTS
ADOU
ADROLE AND ADUSERDATA
ADUSERGROUPS AND ADUSERS
AGENT
Â
ALERTUSERSETTINGS AND ALERTS
APPLICATION BASELINE
ASSET AND ASSETBESTPRACTICES
ASSETCREDENTIALS AND ASSETFIREWALLPOLICY
ASSETRUNNINGPROCESS, ASSETSERVICES, AND ASSETSHARES
ASSETSNMPTABLE, ASSETSYSTEMINFO, AND ASSETTIMESTATS
ASSETUSERS AND AUDITLOG
AZUREADCOMPUTERS AND AZUREADERROR
CERTIFICATE AND CERTIFICATECREATE
COMPANY
COMPANYSTATS AND COMPANYSTATSTIMESERIES
COMPLIANCE
COMPLIANCEASSESSMENTS
COMPLIANCECHECKS
CUSTOMGENERATEDREPORTS
CUSTOMPORTSETTINGS
CUSTOMREPORTBUILDER
CYBERLABELLING AND CYBERPATCHING
CYBERUTILS
DIAGNOSTICS AND DISCOVERYSETTINGS
DOMAINCONFIGURATION AND EDR
EVENTS AND EXTENSION
EXTERNALSCAN AND EXTERNALSCAN_ITADMIN
EXTERNALSCANJOB AND EXTERNALSCANJOB_ITADMIN
EXTERNALSCANNSESCRIPTSINFO AND EXTERNALSCANNSESCRIPTSINFO_ITADMIN
EXTERNALSCANOSINFO AND EXTERNALSCANOSINFO_ITADMIN
EXTERNALSCANPORTSINFO, EXTERNALSCANPORTSINFO_ITADMIN AND EXTERNALSCANSETTINGS
EXTERNALSCANSETTINGS_ITADMIN
FSMOROLES AND INSTALLEDPROGRAM
INTEGRATIONRULESSETTINGS
INTEGRATIONS
INTERFACES AND JOBS
KAPICLIENTS
KIDENTITYPROVIDERS
KROLES
KUSERS
LOG4JINFO AND MANAGEAGENTUPDATES
NOTIFICATIONRULES AND NOTIFICATIONTICKETS
PASSWORDPOLICY, PATCHINGSTATUS, AND PATCHSCHEDULER
PDSCANRESULTS, PDSCANSETTINGS
PORTS AND REGISTRYMISCONFIGURATION
REMEDIATION
REMEDIATIONSUPPRESSION
SCHEDULER
SECURESCORE AND SECURITYCOMPLIANCE
SMBSHAREPATHS AND SNMPV2CREDENTIALS
SNMPV3CREDENTIALS
SSLSCANTIMESERIES
STANDARDREPORTS
STORAGE AND TABLESETTINGS
TICKETINGRULESCONFIG
USERPERMISSIONS AND USERSETTINGS
VULNERABILITY AND VULNERABILITYTIMESERIES
WINDOWSUPDATE
There is an option to Edit and Delete the Roles using the Action column. Any Roles can be edited and deleted if needed.
In the image below, Clone the preexisting Role by giving a new name for the Role if needed.
This completes the Roles section.
Â